Since the entrance of the Internet era, management automation has been an inevitable tendency in many areas. Especially, the great progress of Internet of Things (IoT) in recent years has provided more convenience for basic data integration. This also boosts the development of various management automation systems. In this context, this paper takes physical education as the object, and proposes the design of a control mechanism for educational management automation systems under the IoT environment. First, a description with respect to the overall design, detailed design, and database design is given. In addition, a low-consumption flow table batch update mechanism is studied, which packages and distributes the update rules of all nodes to be updated, in order to reduce the communication consumption between the controller and nodes. The results show that the education management automation of the college gymnasium can be well realized by using the optimization control mechanism. It cannot only make reasonable adjustments to college sports resource data, basic equipment, etc., but also improves the quality of resource management of college physical education courses to ensure that college sports resources can be used in all aspects, and further improves the operating efficiency of the sports management system. The automation technology design of the college sports management system can improve the efficiency of college sports management by more than 20%, so as to ensure the comprehensive development of students in physical education courses and promote the rapid improvement of college management level.
Citation: Yuanfu Liu, Yi Liu. Design of a control mechanism for the educational management automation system under the Internet of Things environment[J]. Mathematical Biosciences and Engineering, 2023, 20(4): 7661-7678. doi: 10.3934/mbe.2023330
[1] | Fang Wang, Weiguo Li, Wendi Bao, Li Liu . Greedy randomized and maximal weighted residual Kaczmarz methods with oblique projection. Electronic Research Archive, 2022, 30(4): 1158-1186. doi: 10.3934/era.2022062 |
[2] | Ranran Li, Hao Liu . On global randomized block Kaczmarz method for image reconstruction. Electronic Research Archive, 2022, 30(4): 1442-1453. doi: 10.3934/era.2022075 |
[3] | Koung Hee Leem, Jun Liu, George Pelekanos . A regularized eigenmatrix method for unstructured sparse recovery. Electronic Research Archive, 2024, 32(7): 4365-4377. doi: 10.3934/era.2024196 |
[4] | Qin Guo, Binlei Cai . Learning capability of the rescaled pure greedy algorithm with non-iid sampling. Electronic Research Archive, 2023, 31(3): 1387-1404. doi: 10.3934/era.2023071 |
[5] | John Daugherty, Nate Kaduk, Elena Morgan, Dinh-Liem Nguyen, Peyton Snidanko, Trung Truong . On fast reconstruction of periodic structures with partial scattering data. Electronic Research Archive, 2024, 32(11): 6481-6502. doi: 10.3934/era.2024303 |
[6] | Zhengyu Liu, Yufei Bao, Changhai Wang, Xiaoxiao Chen, Qing Liu . A fast matrix completion method based on truncated L2,1 norm minimization. Electronic Research Archive, 2024, 32(3): 2099-2119. doi: 10.3934/era.2024095 |
[7] | Jingqian Xu, Ma Zhu, Baojun Qi, Jiangshan Li, Chunfang Yang . AENet: attention efficient network for cross-view image geo-localization. Electronic Research Archive, 2023, 31(7): 4119-4138. doi: 10.3934/era.2023210 |
[8] | Daochang Zhang, Dijana Mosić, Liangyun Chen . On the Drazin inverse of anti-triangular block matrices. Electronic Research Archive, 2022, 30(7): 2428-2445. doi: 10.3934/era.2022124 |
[9] | Huimin Qu, Haiyan Xie, Qianying Wang . Multi-convolutional neural network brain image denoising study based on feature distillation learning and dense residual attention. Electronic Research Archive, 2025, 33(3): 1231-1266. doi: 10.3934/era.2025055 |
[10] | Jiange Liu, Yu Chen, Xin Dai, Li Cao, Qingwu Li . MFCEN: A lightweight multi-scale feature cooperative enhancement network for single-image super-resolution. Electronic Research Archive, 2024, 32(10): 5783-5803. doi: 10.3934/era.2024267 |
Since the entrance of the Internet era, management automation has been an inevitable tendency in many areas. Especially, the great progress of Internet of Things (IoT) in recent years has provided more convenience for basic data integration. This also boosts the development of various management automation systems. In this context, this paper takes physical education as the object, and proposes the design of a control mechanism for educational management automation systems under the IoT environment. First, a description with respect to the overall design, detailed design, and database design is given. In addition, a low-consumption flow table batch update mechanism is studied, which packages and distributes the update rules of all nodes to be updated, in order to reduce the communication consumption between the controller and nodes. The results show that the education management automation of the college gymnasium can be well realized by using the optimization control mechanism. It cannot only make reasonable adjustments to college sports resource data, basic equipment, etc., but also improves the quality of resource management of college physical education courses to ensure that college sports resources can be used in all aspects, and further improves the operating efficiency of the sports management system. The automation technology design of the college sports management system can improve the efficiency of college sports management by more than 20%, so as to ensure the comprehensive development of students in physical education courses and promote the rapid improvement of college management level.
In this paper, we aim to develop a novel weak Galerkin (WG) finite element method for the biharmonic equation that is applicable to non-convex polytopal meshes and eliminates the need for traditional stabilizers. To this aim, we consider the biharmonic equation with Dirichlet and Neumann boundary conditions. The goal is to find an unknown function u satisfying
Δ2u=f,inΩ,u=ξ,on∂Ω,∂u∂n=ν,on∂Ω, | (1.1) |
where Ω⊂Rd is an open bounded domain with a Lipschitz continuous boundary ∂Ω. The domain Ω considered in this paper can be of any dimension d≥2. For the sake of clarity in presentation, we will focus on the case where d=2 throughout this paper. However, the analysis presented here can be readily extended to higher dimensions (d≥3) without significant modifications.
The variational formulation of the model problem (1.1) is as follows: Find an unknown function u∈H2(Ω) satisfying u|∂Ω=ξ and ∂u∂n|∂Ω=ν, and the following equation
2∑i,j=1(∂2iju,∂2ijv)=(f,v),∀v∈H20(Ω), | (1.2) |
where ∂2ij denotes the second order partial derivative with respect to xi and xj, and H20(Ω)={v∈H2(Ω):v|∂Ω=0,∇v|∂Ω=0}.
The WG finite element method offers an innovative framework for the numerical solution of partial differential equations (PDEs). This approach approximates differential operators within a structure inspired by the theory of distributions, particularly for piecewise polynomial functions. Unlike traditional methods, WG reduces the regularity requirements on approximating functions through the use of carefully designed stabilizers. Extensive studies have highlighted the versatility and effectiveness of WG methods across a wide range of model PDEs, as demonstrated by numerous references [1,2,3,4,5,6] for an incomplete list, establishing WG as a powerful tool in scientific computing. The defining feature of WG methods lies in their innovative use of weak derivatives and weak continuities to construct numerical schemes based on the weak forms of the underlying PDEs. This unique structure provides WG methods with exceptional flexibility, enabling them to address a wide variety of PDEs while ensuring both stability and accuracy in their numerical solutions.
This paper presents a simplified formulation of the WG finite element method, capable of handling both convex and non-convex elements in finite element partitions. A key innovation of our method is the elimination of stabilizers through the use of higher-degree polynomials for computing weak second-order partial derivatives. This design preserves the size and global sparsity of the stiffness matrix while substantially reducing the programming complexity associated with traditional stabilizer-dependent methods. The method leverages bubble functions as a critical analytical tool, representing a significant improvement over existing stabilizer-free WG methods [7], which are limited to convex polytopal meshes. Our approach is versatile, accommodating arbitrary dimensions and polynomial degrees in the discretization process. In contrast, prior stabilizer-free WG methods [7] often require specific polynomial degree combinations and are restricted to 2D or 3D settings. Theoretical analysis establishes optimal error estimates for the WG approximations in both the discrete H2 norm and an L2 norm.
This paper is organized as follows. Section 2 provides a brief review of the definition of the weak-second order partial derivative and its discrete counterpart. In Section 3, we introduce an efficient WG scheme that eliminates the need for stabilization terms. Section 4 establishes the existence and uniqueness of the solution. The error equation for the proposed WG scheme is derived in Section 5. Section 6 focuses on obtaining the error estimate for the numerical approximation in the discrete H2 norm, while Section 7 extends the analysis to derive the error estimate in the L2 norm.
Throughout this paper, we adopt standard notations. Let D be any open, bounded domain with a Lipschitz continuous boundary in Rd. The inner product, semi-norm, and norm in the Sobolev space Hs(D) for any integer s≥0 are denoted by (⋅,⋅)s,D, |⋅|s,D and ‖⋅‖s,D respectively. For simplicity, when the domain D is Ω, the subscript D is omitted from these notations. In the case s=0, the notations (⋅,⋅)0,D, |⋅|0,D and ‖⋅‖0,D are further simplified as (⋅,⋅)D, |⋅|D and ‖⋅‖D, respectively.
This section provides a brief review of the definition of weak weak-second partial derivatives and their discrete counterparts, as introduced in [5].
Let T be a polygonal element with boundary ∂T. A weak function on T is represented as v={v0,vb,vg}, where v0∈L2(T), vb∈L2(∂T) and vg∈[L2(∂T)]2. The first component, v0, denotes the value of v within the interior of T, while the second component, vb, represents the value of v on the boundary of T. The third component vg∈R2 with components vgi (i=1,2) approximates the gradient ∇v on the boundary ∂T. In general, vb and vg are treated as independent of the traces of v0 and ∇v0, respectively.
The space of all weak functions on T, denote by W(T), is defined as
W(T)={v={v0,vb,vg}:v0∈L2(T),vb∈L2(∂T),vg∈[L2(∂T)]2}. |
The weak second order partial derivative, ∂2ij,w, is a linear operator mapping W(T) to the dual space of H2(T). For any v∈W(T), ∂2ij,wv is defined as a bounded linear functional on H2(T), given by:
(∂2ij,wv,φ)T=(v0,∂2jiφ)T−⟨vbni,∂jφ⟩∂T+⟨vgi,φnj⟩∂T,∀φ∈H2(T), |
where n, with components ni(i=1,2), represents the unit outward normal vector to ∂T.
For any non-negative integer r≥0, let Pr(T) denote the space of polynomials on T with total degree at most r. A discrete weak second order partial derivative, ∂2ij,w,r,T, is a linear operator mapping W(T) to Pr(T). For any v∈W(T), ∂2ij,w,r,Tv is the unique polynomial in Pr(T) satisfying
(∂2ij,w,r,Tv,φ)T=(v0,∂2jiφ)T−⟨vbni,∂jφ⟩∂T+⟨vgi,φnj⟩∂T,∀φ∈Pr(T). | (2.1) |
For a smooth v0∈H2(T), applying standard integration by parts to the first term on the right-hand side of (2.1) yields:
(∂2ij,w,r,Tv,φ)T=(∂2ijv0,φ)T−⟨(vb−v0)ni,∂jφ⟩∂T+⟨vgi−∂iv0,φnj⟩∂T, | (2.2) |
for any φ∈Pr(T).
Let Th be a finite element partition of the domain Ω⊂R2 into polygons. Assume that Th satisfies the shape regularity condition [8]. Let Eh represent the set of all edges in Th, and denote the set of interior edges by E0h=Eh∖∂Ω. For any element T∈Th, let hT be its diameter, and define the mesh size as h=maxT∈ThhT.
Let k, p and q be integers such that k≥p≥q≥1. For any element T∈Th, the local weak finite element space is defined as:
V(k,p,q,T)={{v0,vb,vg}:v0∈Pk(T),vb∈Pp(e),vg∈[Pq(e)]2,e⊂∂T}. |
By combining the local spaces V(k,p,q,T) across all elements T∈Th and ensuring continuity of vb and vg along the interior edges E0h, we obtain the global weak finite element space:
Vh={{v0,vb,vg}: {v0,vb,vg}|T∈V(k,p,q,T),∀T∈Th}. |
The subspace of Vh consisting of functions with vanishing boundary values on ∂Ω is defined as:
V0h={v∈Vh:vb|∂Ω=0,vg|∂Ω=0}. |
For simplicity, the discrete weak second order partial derivative ∂2ij,wv is used to denote the operator ∂2ij,w,r,Tv defined in (2.1) on each element T∈Th, as:
(∂2ij,wv)|T=∂2ij,w,r,T(v|T),∀T∈Th. |
On each element T∈Th, let Q0 denote the L2 projection onto Pk(T). On each edge e⊂∂T, let Qb and Qn denote the L2 projection operators onto Pp(e) and Pq(e), respectively. For any w∈H2(Ω), the L2 projection into the weak finite element space Vh is denoted by Qhw, defined as:
(Qhw)|T:={Q0(w|T),Qb(w|∂T),Qn(∇w|∂T)},∀T∈Th. |
The simplified WG numerical scheme, free from stabilization terms, for solving the biharmonic equation (1.1) is formulated as follows:
Weak Galerkin Algorithm 3.1. Find uh={u0,ub,ug}∈Vh such that ub=Qbξ, ug⋅n=Qnν and ug⋅τ=Qn(∇ξ⋅τ) on ∂Ω, and satisfy:
(∂2wuh,∂2wv)=(f,v0),∀v={v0,vb,vg}∈V0h, | (3.1) |
where τ∈R2 is the tangential direction along ∂Ω, and the terms are defined as:
(∂2wuh,∂2wv)=∑T∈Th2∑i,j=1(∂2ij,wuh,∂2ij,wv)T, |
(f,v0)=∑T∈Th(f,v0)T. |
Recall that Th is a shape-regular finite element partition of the domain Ω. Consequently, for any T∈Th and ϕ∈H1(T), the following trace inequality holds [8]:
‖ϕ‖2∂T≤C(h−1T‖ϕ‖2T+hT‖∇ϕ‖2T). | (4.1) |
If ϕ is a polynomial on the element T∈Th, a simpler form of the trace inequality applies [8]:
‖ϕ‖2∂T≤Ch−1T‖ϕ‖2T. | (4.2) |
For any v={v0,vb,vg}∈Vh, define the norm:
|||v|||=(∂2wv,∂2wv)12, | (4.3) |
and introduce the discrete H2- semi-norm:
‖v‖2,h=(∑T∈Th‖2∑i,j=1∂2ijv0‖2T+h−3T‖v0−vb‖2∂T+h−1T‖∇v0−vg‖2∂T)12. | (4.4) |
Lemma 4.1. For v={v0,vb,vg}∈Vh, there exists a constant C such that for i,j=1,2,
‖∂2ijv0‖T≤C‖∂2ij,wv‖T. |
Proof. Let T∈Th be a polytopal element with N edges denoted as e1,⋯, eN. Importantly, T can be non-convex. On each edge ei, construct a linear function li(x) satisfying li(x)=0 on ei as:
li(x)=1hT→AX⋅ni, |
where A is a fixed point on ei, X is any point on ei, ni is the normal vector to ei, and hT is the diameter of T.
Define the bubble function for T as:
ΦB=l21(x)l22(x)⋯l2N(x)∈P2N(T). |
It is straightforward to verify that ΦB=0 on ∂T. The function ΦB can be scaled such that ΦB(M)=1 where M is the barycenter of T. Additionally, there exists a subdomain ˆT⊂T such that ΦB≥ρ0 for some constant ρ0>0.
For v={v0,vb,vg}∈Vh, let r=2N+k−2 and choose φ=ΦB∂2ijv0∈Pr(T) in (2.2). This yields:
(∂2ij,wv,ΦB∂2ijv0)T=(∂2ijv0,ΦB∂2ijv0)T−⟨(vb−v0)ni,∂j(ΦB∂2ijv0)⟩∂T+⟨vgi−∂iv0,ΦB∂2ijv0nj⟩∂T=(∂2ijv0,ΦB∂2ijv0)T, | (4.5) |
where we applied ΦB=0 on ∂T.
Using the domain inverse inequality [8], there exists a constant C such that
(∂2ijv0,ΦB∂2ijv0)T≥C(∂2ijv0,∂2ijv0)T. | (4.6) |
By applying the Cauchy-Schwarz inequality to (4.5) and (4.6), we obtain
(∂2ijv0,∂2ijv0)T≤C(∂2ij,wv,ΦB∂2ijv0)T≤C‖∂2ij,wv‖T‖ΦB∂2ijv0‖T≤C‖∂2ij,wv‖T‖∂2ijv0‖T, |
which implies:
‖∂2ijv0‖T≤C‖∂2ij,wv‖T. |
This completes the proof.
Remark 4.1. If the polytopal element T is convex, the bubble function in Lemma 4.1 can be simplified to:
ΦB=l1(x)l2(x)⋯lN(x). |
This simplified bubble function satisfies 1) ΦB=0 on ∂T, 2) there exists a subdomain ˆT⊂T such that ΦB≥ρ0 for some constant ρ0>0. The proof of Lemma 4.1 follows the same approach, using this simplified bubble function. In this case, we set r=N+k−2.
By constructing an edge-based bubble function,
φek=Πi=1,⋯,N,i≠kl2i(x), |
it can be easily verified that 1) φek=0 on each edge ei for i≠k, and 2) there exists a subdomain ^ek⊂ek such that φek≥ρ1 for some constant ρ1>0. Let φ=(vb−v0)lkφek. It is straightforward to verify the following properties: 1) φ=0 on each edge ei for i=1,⋯,N, 2) ∇φ=0 on each edge ei for i≠k, and 3) ∇φ=(v0−vb)(∇lk)φek=O((v0−vb)φekhTC) on ek, where C is a constant vector.
Lemma 4.2. [9] For {v0,vb,vg}∈Vh, let φ=(vb−v0)lkφek. The following inequality holds:
‖φ‖2T≤ChT∫ek(vb−v0)2ds. | (4.7) |
Lemma 4.3. For {v0,vb,vg}∈Vh, let φ=(vgi−∂iv0)φek. The following inequality holds:
‖φ‖2T≤ChT∫ek(vgi−∂iv0)2ds. | (4.8) |
Proof. Define the extension of vg, originally defined on the edge ek, to the entire polytopal element T as:
vg(X)=vg(Projek(X)), |
where X=(x1,x2) is any point in T, Projek(X) denotes the orthogonal projection of X onto the plane H⊂R2 containing ek. If Projek(X) is not on ek, vg(Projek(X)) is defined as the extension of vg from ek to H. The extension preserves the polynomial nature of vg as demonstrated in [9].
Let vtrace denote the trace of v0 on ek. Define its extension to T as:
vtrace(X)=vtrace(Projek(X)). |
This extension is also polynomial, as demonstrated in [9].
Let φ=(vgi−∂iv0)φek. Then,
‖φ‖2T=∫Tφ2dT=∫T((vgi−∂iv0)(X)φek)2dT≤ChT∫ek((vgi−∂iv0)(Projek(X))φek)2dT≤ChT∫ek(vgi−∂iv0)2ds, |
where we used the facts that 1) φek=0 on each edge ei for i≠k, 2) there exists a subdomain ^ek⊂ek such that φek≥ρ1 for some constant ρ1>0, and applied the properties of the projection.
This completes the proof of the lemma.
Lemma 4.4. There exist two positive constants, C1 and C2, such that for any v={v0,vb,vg}∈Vh, the following equivalence holds:
C1‖v‖2,h≤|||v|||≤C2‖v‖2,h. | (4.9) |
Proof. Consider the edge-based bubble function defined as
φek=Πi=1,⋯,N,i≠kl2i(x). |
First, extend vb from the edge ek to the element T. Similarly, let vtrace denote the trace of v0 on the edge ek and extend vtrace to the element T. For simplicity, we continue to use vb and v0 to represent their respective extensions. Details of these extensions can be found in Lemma 4.3. Substituting φ=(vb−v0)lkφek into (2.2), we obtain
(∂2ij,wv,φ)T=(∂2ijv0,φ)T−⟨(vb−v0)ni,∂jφ⟩∂T+⟨vgi−∂iv0,φnj⟩∂T=(∂2ijv0,φ)T+Ch−1T∫ek|vb−v0|2φekds, | (4.10) |
where we used 1) φ=0 on each edge ei for i=1, ⋯, N, 2) ∇φ=0 on each edge ei for i≠k, and 3) ∇φ=(v0−vb)(∇lk)φek=O((v0−vb)φekhTC) on ek, where C is a constant vector.
Recall that 1) φek=0 on each edge ei for i≠k, and 2) there exists a subdomain ^ek⊂ek such that φek≥ρ1 for some constant ρ1>0. Using Cauchy-Schwarz inequality, the domain inverse inequality [8], (4.10) and Lemma 4.2, we deduce:
∫ek|vb−v0|2ds≤C∫ek|vb−v0|2φekds≤ChT(‖∂2ij,wv‖T+‖∂2ijv0‖T)‖φ‖T≤Ch32T(‖∂2ij,wv‖T+‖∂2ijv0‖T)(∫ek|vb−v0|2ds)12, |
which, from Lemma 4.1, leads to:
h−3T∫ek|vb−v0|2ds≤C(‖∂2ij,wv‖2T+‖∂2ijv0‖2T)≤C‖∂2ij,wv‖2T. | (4.11) |
Next, extend vg from the edge ek to the element T, denoting the extension by the same symbol for simplicity. Details of this extension are in Lemma 4.3. Substituting φ=(vgi−∂iv0)φek into (2.2), we obtain:
(∂2ij,wv,φ)T=(∂2ijv0,φ)T−⟨(vb−v0)ni,∂jφ⟩∂T+⟨vgi−∂iv0,φnj⟩∂T=(∂2ijv0,φ)T−⟨(vb−v0)ni,∂jφ⟩∂T+∫ek|vgi−∂iv0|2φekds, | (4.12) |
where we used φek=0 on edge ei for i≠k, and the fact that there exists a sub-domain ^ek⊂ek such that φek≥ρ1 for some constant ρ1>0. This, together with Cauchy-Schwarz inequality, the domain inverse inequality [8], the inverse inequality, the trace inequality (4.2), (4.11) and Lemma 4.3, gives
∫ek|vgi−∂iv0|2ds≤C∫ek|vgi−∂iv0|2φekds≤C(‖∂2ij,wv‖T+‖∂2ijv0‖T)‖φ‖T+C‖v0−vb‖∂T‖∂jϕ‖∂T≤Ch12T(‖∂2ij,wv‖T+‖∂2ijv0‖T)(∫ek|vgi−∂iv0|2ds)12+Ch32T‖∂2ij,wv‖Th−1T(∫ek|vgi−∂iv0|2ds)12. |
Applying Lemma 4.1, gives
h−1T∫ek|vgi−∂iv0|2ds≤C(‖∂2ij,wv‖2T+‖∂2ijv0‖2T)≤C‖∂2ij,wv‖2T. | (4.13) |
Using Lemma 4.1, Eqs (4.11), (4.13), (4.3) and (4.4), we deduce:
C1‖v‖2,h≤|||v|||. |
Finally, using the Cauchy-Schwarz inequality, inverse inequalities, and the trace inequality (4.2) in (2.2), we derive:
|(∂2ij,wv,φ)T|≤‖∂2ijv0‖T‖φ‖T+‖(vb−v0)ni‖∂T‖∂jφ‖∂T+‖vgi−∂iv0‖∂T‖φnj‖∂T≤‖∂2ijv0‖T‖φ‖T+h−32T‖vb−v0‖∂T‖φ‖T+h−12T‖vgi−∂iv0‖∂T‖φ‖T, |
which gives:
‖∂2ij,wv‖2T≤C(‖∂2ijv0‖2T+h−3T‖vb−v0‖2∂T+h−1T‖vgi−∂iv0‖2∂T), |
and further gives
|||v|||≤C2‖v‖2,h. |
This completes the proof.
Theorem 4.5. The WG scheme 3.1 admits a unique solution.
Proof. Assume that u(1)h∈Vh and u(2)h∈Vh are two distinct solutions of the WG scheme 3.1. Define ηh=u(1)h−u(2)h∈V0h. Then, ηh satisfies
(∂2ij,wηh,∂2ij,wv)=0,∀v∈V0h. |
Choosing v=ηh yields |||ηh|||=0. From the equivalence of norms in (4.9), it follows that ‖ηh‖2,h=0, which yields ∂2ijη0=0 for i,j=1,2 on each T, η0=ηb and ∇η0=ηg on each ∂T. Consequently, η0 is a linear function on each element T and ∇η0=C on each T.
Since ∇η0=ηg on each ∂T, it follows that ∇η0 is continuous across the entire domain Ω. Thus, ∇η0=C throughout Ω. Furthermore, the condition ηg=0 on ∂Ω implies ∇η0=0 in Ω and ηg=0 on each ∂T. Therefore, η0 is a constant on each element T.
Since η0=ηb on ∂T, the continuity of η0 over Ω implies η0 is globally constant. From ηb=0 on ∂Ω, we conclude η0=0 throughout Ω. Consequently, ηb=η0=0 on each ∂T, which implies ηh≡0 in Ω. Thus, u(1)h≡u(2)h, proving the uniqueness of the solution.
Let Qr denote the L2 projection operator onto the finite element space of piecewise polynomials of degree at most r.
Lemma 5.1. The following property holds:
∂2ij,wu=Qr(∂2iju),∀u∈H2(T). | (5.1) |
Proof. For any u∈H2(T), using (2.2), we have
(∂2ij,wu,φ)T=(∂2iju,φ)T−⟨(u|∂T−u|T)ni,∂jφ⟩∂T+⟨(∇u|∂T)i−∂i(u|T),φnj⟩∂T=(∂2iju,φ)T=(Qr(∂2iju),φ)T, |
for all φ∈Pr(T). This completes the proof.
Let u be the exact solution of the biharmonic equation (1.1), and uh∈Vh its numerical approximation obtained from the WG scheme 3.1. The error function, denoted by eh, is defined as
eh=u−uh. | (5.2) |
Lemma 5.2. The error function eh defined in (5.2) satisfies the following error equation:
(∂2weh,∂2wv)=ℓ(u,v),∀v∈V0h, | (5.3) |
where
ℓ(u,v)=∑T∈Th2∑i,j=1−⟨(vb−v0)ni,∂j((Qr−I)∂2iju)⟩∂T+⟨vgi−∂iv0,(Qr−I)∂2ijunj⟩∂T. |
Proof. Using (5.1), standard integration by parts, and substituting φ=Qr∂2iju into (2.2), we obtain
∑T∈Th2∑i,j=1(∂2ij,wu,∂2ij,wv)T=∑T∈Th2∑i,j=1(Qr∂2iju,∂2ij,wv)T=∑T∈Th2∑i,j=1(∂2ijv0,Qr∂2iju)T−⟨(vb−v0)ni,∂j(Qr∂2iju)⟩∂T+⟨vgi−∂iv0,Qr∂2ijunj⟩∂T=∑T∈Th2∑i,j=1(∂2ijv0,∂2iju)T−⟨(vb−v0)ni,∂j(Qr∂2iju)⟩∂T+⟨vgi−∂iv0,Qr∂2ijunj⟩∂T=∑T∈Th2∑i,j=1((∂2ij)2u,v0)T+⟨∂2iju,∂iv0⋅nj⟩∂T−⟨∂j(∂2iju)⋅ni,v0⟩∂T−⟨(vb−v0)ni,∂j(Qr∂2iju)⟩∂T+⟨vgi−∂iv0,Qr∂2ijunj⟩∂T=(f,v0)+∑T∈Th2∑i,j=1−⟨(vb−v0)ni,∂j((Qr−I)∂2iju)⟩∂T+⟨vgi−∂iv0,(Qr−I)∂2ijunj⟩∂T, | (5.4) |
where we used (1.1), ∂2ijv0∈Pk−2(T) and r=2N+k−2≥k−2, ∑T∈Th∑2i,j=1⟨∂2iju,vgi⋅nj⟩∂T=∑T∈Th∑2i,j=1⟨∂2iju,vgi⋅nj⟩∂Ω=0 since vgi=0 on ∂Ω, and ∑T∈Th∑2i,j=1⟨∂j(∂2iju)⋅ni,vb⟩∂T=∑T∈Th∑2i,j=1⟨∂j(∂2iju)⋅ni,vb⟩∂Ω=0 since vb=0 on ∂Ω.
Subtracting (3.1) from (5.4) yields
∑T∈Th2∑i,j=1(∂2ij,weh,∂2ij,wv)T=∑T∈Th2∑i,j=1−⟨(vb−v0)ni,∂j((Qr−I)∂2iju)⟩∂T+⟨vgi−∂iv0,(Qr−I)∂2ijunj⟩∂T. |
This concludes the proof.
Lemma 6.1. [5] Let Th be a finite element partition of the domain Ω satisfying the shape regularity assumption specified in [8]. For any 0≤s≤2 and 1≤m≤k, the following estimates hold:
∑T∈Th2∑i,j=1h2sT‖∂2iju−Qr∂2iju‖2s,T≤Ch2(m−1)‖u‖2m+1, | (6.1) |
∑T∈Thh2sT‖u−Q0u‖2s,T≤Ch2(m+1)‖u‖2m+1. | (6.2) |
Lemma 6.2. If u∈Hk+1(Ω), then there exists a constant C such that
|||u−Qhu|||≤Chk−1‖u‖k+1. | (6.3) |
Proof. Utilizing (2.2), the trace inequalities (4.1) and (4.2), the inverse inequality, and the estimate (6.2) for m=k and s=0,1,2, we analyze the following summation for any φ∈Pr(T):
∑T∈Th2∑i,j=1(∂2ij,w(u−Qhu),φ)T=∑T∈Th2∑i,j=1(∂2ij(u−Q0u),φ)T−⟨(Q0u−Qbu)ni,∂jφ⟩∂T+⟨(∂iu−Qn(∂iu))−∂i(u−Q0u),φnj⟩∂T≤(∑T∈Th2∑i,j=1‖∂2ij(u−Q0u)‖2T)12(∑T∈Th‖φ‖2T)12+(∑T∈Th2∑i=1‖(Q0u−Qbu)ni‖2∂T)12(∑T∈Th2∑j=1‖∂jφ‖2∂T)12+(∑T∈Th2∑i=1‖∂i(Q0u)−Qn(∂iu)‖2∂T)12(∑T∈Th2∑j=1‖φnj‖2∂T)12≤(∑T∈Th2∑i,j=1‖∂2ij(u−Q0u)‖2T)12(∑T∈Th‖φ‖2T)12+(∑T∈Thh−1T‖Q0u−u‖T+hT‖Q0u−u‖21,T)12(∑T∈Thh−3T‖φ‖2T)12+(∑T∈Th2∑i=1h−1T‖∂i(Q0u)−∂iu‖2T+hT‖∂i(Q0u)−∂iu‖21,T)12(∑T∈Thh−1T‖φ‖2T)12≤Chk−1‖u‖k+1(∑T∈Th‖φ‖2T)12. |
Letting φ=∂2ij,w(u−Qhu) gives
∑T∈Th2∑i,j=1(∂2ij,w(u−Qhu),∂2ij,w(u−Qhu))T≤Chk−1‖u‖k+1|||u−Qhu|||. |
This completes the proof.
Theorem 6.3. Suppose the exact solution u of the biharmonic equation (1.1) satisfies u∈Hk+1(Ω). Then, the error estimate satisfies:
|||u−uh|||≤Chk−1‖u‖k+1. | (6.4) |
Proof. Note that r≥1. For the first term on the right-hand side of the error equation (5.3), using Cauchy-Schwarz inequality, the trace inequality (4.1), the estimate (6.1) with m=k and s=1,2, and (4.9), we have
|∑T∈Th2∑i,j=1−⟨(vb−v0)ni,∂j((Qr−I)∂2iju)⟩∂T|≤C(∑T∈Th2∑i=1h−3T‖(vb−v0)ni‖2∂T)12⋅(∑T∈Th2∑i,j=1h3T‖∂j((Qr−I)∂2iju)‖2∂T)12≤C‖v‖2,h(∑T∈Th2∑i,j=1h2T‖∂j((Qr−I)∂2iju)‖2T+h4T‖∂j((Qr−I)∂2iju)‖21,T)12≤Chk−1‖u‖k+1|||v|||. | (6.5) |
For the second term on the right-hand side of the error equation (5.3), using the Cauchy-Schwarz inequality, the trace inequality (4.1), the estimate (6.1) with m=k and s=0,1, and (4.9), we have
|∑T∈Th2∑i,j=1⟨vgi−∂iv0,(Qr−I)∂2ijunj⟩∂T|≤C(∑T∈Th2∑i=1h−1T‖vgi−∂iv0‖2∂T)12(∑T∈Th2∑i,j=1hT‖(Qr−I)∂2ijunj‖2∂T)12≤C‖v‖2,h(∑T∈Th2∑i,j=1‖(Qr−I)∂2ijunj‖2T+h2T‖(Qr−I)∂2ijunj‖21,T)12≤C‖v‖2,hhk−1‖u‖k+1≤Chk−1‖u‖k+1|||v|||. | (6.6) |
Substituting (6.5) and (6.6) into (5.3) gives
(∂2ij,weh,∂2ij,wv)≤Chk−1‖u‖k+1|||v|||. | (6.7) |
Using Cauchy-Schwarz inequality, letting v=Qhu−uh in (6.7), the error estimate (6.3) gives
|||u−uh|||2=∑T∈Th2∑i,j=1(∂2ij,w(u−uh),∂2ij,w(u−Qhu))T+(∂2ij,w(u−uh),∂2ij,w(Qhu−uh))T≤|||u−uh||||||u−Qhu|||+Chk−1‖u‖k+1|||Qhu−uh|||≤|||u−uh||||||u−Qhu|||+Chk−1‖u‖k+1(|||Qhu−u|||+|||u−uh|||)≤|||u−uh||||||u−Qhu|||+Chk−1‖u‖k+1hk−1‖u‖k+1+Chk−1‖u‖k+1|||u−uh|||, |
which further gives
|||u−uh|||≤|||u−Qhu|||+Chk−1‖u‖k+1≤Chk−1‖u‖k+1. |
This completes the proof.
To derive the error estimate in the L2 norm, we use the standard duality argument. The error is expressed as eh=u−uh={e0,eb,eg}, and we define ζh=Qhu−uh={ζ0,ζb,ζg}∈V0h. Consider the dual problem associated with the biharmonic equation (1.1), which seeks a function w∈H20(Ω) satisfying:
Δ2w=ζ0,in Ω,w=0,on ∂Ω,∂w∂n=0,on ∂Ω. | (7.1) |
We assume the following regularity condition for the dual problem:
‖w‖4≤C‖ζ0‖. | (7.2) |
Theorem 7.1. Let u∈Hk+1(Ω) be the exact solution of the biharmonic equation (1.1), and let uh∈Vh denote the numerical solution obtained using the weak Galerkin scheme 3.1. Assume that the H4-regularity condition (7.2) holds. Then, there exists a constant C such that
‖e0‖≤Chk+1‖u‖k+1. |
Proof. Testing the dual problem (7.1) with ζ0 and applying integration by parts, we derive:
‖ζ0‖2=(Δ2w,ζ0)=∑T∈Th2∑i,j=1(∂2ijw,∂2ijζ0)T−⟨∂2ijw,∂iζ0⋅nj⟩∂T+⟨∂j(∂2ijw)⋅ni,ζ0⟩∂T=∑T∈Th2∑i,j=1(∂2ijw,∂2ijζ0)T−⟨∂2ijw,(∂iζ0−ζgi)⋅nj⟩∂T+⟨∂j(∂2ijw)⋅ni,ζ0−ζb⟩∂T, | (7.3) |
where we used ∑T∈Th∑2i,j=1⟨∂2ijw,ζgi⋅nj⟩∂T=∑2i,j=1⟨∂2ijw,ζgi⋅nj⟩∂Ω=0 due to ζg=0 on ∂Ω, and ∑T∈Th∑2i,j=1⟨∂j(∂2ijw)⋅ni,ζb⟩∂T=∑2i,j=1⟨∂j(∂2ijw)⋅ni,ζb⟩∂Ω=0 due to ζb=0 on ∂Ω.
Letting u=w and v=ζh in (5.4) gives
∑T∈Th2∑i,j=1(∂2ij,ww,∂2ij,wζh)T=∑T∈Th2∑i,j=1(∂2ijw,∂2ijζ0)T−⟨(ζb−ζ0)ni,∂j(Qr∂2ijw)⟩∂T+⟨ζgi−∂iζ0,Qr∂2ijwnj⟩∂T, |
which is equivalent to
∑T∈Th2∑i,j=1(∂2ijw,∂2ijζ0)T=∑T∈Th2∑i,j=1(∂2ij,ww,∂2ij,wζh)T+⟨(ζb−ζ0)ni,∂j(Qr∂2ijw)⟩∂T−⟨ζgi−∂iζ0,Qr∂2ijwnj⟩∂T. |
Substituting the above equation into (7.3) and using (5.3) gives
‖ζ0‖2=∑T∈Th2∑i,j=1(∂2ij,ww,∂2ij,wζh)T+⟨(ζb−ζ0)ni,∂j((Qr−I)∂2ijw)⟩∂T−⟨ζgi−∂iζ0,(Qr−I)∂2ijwnj⟩∂T=∑T∈Th2∑i,j=1(∂2ij,ww,∂2ij,weh)T+(∂2ij,ww,∂2ij,w(Qhu−u))T−ℓ(w,ζh)=∑T∈Th2∑i,j=1(∂2ij,wQhw,∂2ij,weh)T+(∂2ij,w(w−Qhw),∂2ij,weh)T+(∂2ij,ww,∂2ij,w(Qhu−u))T−ℓ(w,ζh)=ℓ(u,Qhw)+∑T∈Th2∑i,j=1(∂2ij,w(w−Qhw),∂2ij,weh)T+(∂2ij,ww,∂2ij,w(Qhu−u))T−ℓ(w,ζh)=J1+J2+J3+J4. | (7.4) |
We will estimate the four terms Ji(i=1, ⋯, 4) on the last line of (7.4) individually.
For J1, using the Cauchy-Schwarz inequality, the trace inequality (4.1), the inverse inequality, the estimate (6.1) with m=k and s=0,1,2, the estimate (6.2) with m=3 and s=0,1,2, gives
J1=ℓ(u,Qhw)≤|∑T∈Th2∑i,j=1−⟨(Qbw−Q0w)ni,∂j((Qr−I)∂2iju)⟩∂T+⟨Qn(∂iw)−∂iQ0w,(Qr−I)∂2ijunj⟩∂T|≤(∑T∈Th2∑i=1‖(Qbw−Q0w)ni‖2∂T)12(∑T∈Th2∑i,j=1‖∂j((Qr−I)∂2iju)‖2∂T)12+(∑T∈Th2∑i=1‖Qn(∂iw)−∂iQ0w‖2∂T)12(∑T∈Th2∑i,j=1‖(Qr−I)∂2ijunj‖2∂T)12≤(∑T∈Thh−1T‖w−Q0w‖2T+hT‖w−Q0w‖21,T)12⋅(∑T∈Th2∑i,j=1h−1T‖∂j((Qr−I)∂2iju)‖2T+hT‖∂j((Qr−I)∂2iju)‖21,T)12+(∑T∈Th2∑i=1h−1T‖∂iw−∂iQ0w‖2T+hT‖∂iw−∂iQ0w‖21,T)12⋅(∑T∈Th2∑i,j=1h−1T‖(Qr−I)∂2ijunj‖2T+hT‖(Qr−I)∂2ijunj‖21,T)12≤Chk+1‖u‖k+1‖w‖4. | (7.5) |
For J_2 , using Cauchy-Schwarz inequality, (6.3) with k = 3 and (6.4) gives
\begin{equation} \begin{split} J_2\leq ||| w-Q_hw||| ||| e_h|||\leq Ch^{k-1}\|u\|_{k+1}h^2\|w\|_4\leq Ch^{k+1}\|u\|_{k+1}\|w\|_4. \end{split} \end{equation} | (7.6) |
For J_3 , denote by Q^1 a L^2 projection onto P_1(T) . Using (2.1) gives
\begin{equation} \begin{split} &\; (\partial^2_{ij, w}(Q_hu-u), Q^1\partial^2_{ij, w} w)_T\\ = &\; (Q_0u-u, \partial^2_{ji} ( Q^1\partial^2_{ij, w} w))_T-\langle Q_bu-u, \partial_j (Q^1\partial^2_{ij, w} w)\rangle_{\partial T}+ \langle Q_n(\partial_i u)-\partial_i u, Q^1\partial^2_{ij, w} w n_j\rangle_{\partial T}\\ = &\; 0, \end{split} \end{equation} | (7.7) |
where we used \partial^2_{ji} (Q^1\partial^2_{ij, w} w) = 0 , \partial_j (Q^1\partial^2_{ij, w} w) = C and the property of the projection operators Q_b and Q_n and p\geq q\geq 1 .
Using (7.7), Cauchy-Schwarz inequality, (5.1) and (6.3), gives
\begin{equation} \begin{split} J_3\leq &\; |\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i, j = 1}^2(\partial^2_{ij, w} w, \partial^2_{ij, w} (Q_hu-u))_T| \\ = &\; |\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i, j = 1}^2(\partial^2_{ij, w} w-Q^1\partial^2_{ij, w} w, \partial^2_{ij, w} (Q_hu-u))_T|\\ = &\; |\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i, j = 1}^2(Q_r\partial^2_{ij} w-Q^1 Q_r\partial^2_{ij} w, \partial^2_{ij, w} (Q_hu-u))_T|\\ \leq & \; \Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i, j = 1}^2\|Q_r\partial^2_{ij} w-Q^1 Q^r\partial^2_{ij} w\|_T^2\Big)^{\frac{1}{2}} ||| Q_hu-u |||\\ \leq & \; Ch^{k+1}\|u\|_{k+1} \|w\|_4. \end{split} \end{equation} | (7.8) |
For J_4 , using Cauchy-Schwarz inequality, the trace inequality (4.1), Lemma 4.4, the estimate (6.1) with m = 3 and s = 0, 1 , (6.3), (6.4) gives
\begin{equation} \begin{split} J_4 = &\; \ell(w, \zeta_h)\\ \leq &\; \Big|\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i,j = 1}^2 - \langle (\zeta_b-\zeta_0) n_i, \partial_j ((Q_r-I) \partial_{ij}^2 w) \rangle_{\partial T}\\&+\langle \zeta_{gi}-\partial_i \zeta_0, (Q_r-I) \partial_{ij}^2 w n_j\rangle_{\partial T}\Big| \\ \leq&\; \Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i = 1}^2\|(\zeta_b-\zeta_0) n_i\|_{\partial T}^2\Big)^{\frac{1}{2}} \Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i,j = 1}^2\|\partial_j ((Q_r-I) \partial_{ij}^2 w) \|_{\partial T}^2\Big)^{\frac{1}{2}} \\ &+\Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i = 1}^2\|\zeta_{gi}-\partial_i \zeta_0\|_{\partial T}^2\Big)^{\frac{1}{2}} \Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i,j = 1}^2\|(Q_r-I) \partial_{ij}^2 w n_j\|_{\partial T}^2\Big)^{\frac{1}{2}} \\ \leq&\; \Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i,j = 1}^2h_T^2 \|\partial_j ((Q_r-I) \partial_{ij}^2 w)\|_{T}^2+h_T^4 \| \partial_j ((Q_r-I) \partial_{ij}^2 w)\|_{1, T}^2\Big)^{\frac{1}{2}} \\&\cdot\Big(\sum\limits_{T\in {\mathcal{T}}_h}h_T^{-3}\|\zeta_0-\zeta_b\|_{\partial T}^2\Big)^{\frac{1}{2}} \\ &+ \Big(\sum\limits_{T\in {\mathcal{T}}_h} \sum\limits_{i,j = 1}^2 \|(Q_r-I) \partial_{ij}^2 w n_j\|_{T}^2+h_T^2 \|(Q_r-I) \partial_{ij}^2 w n_j\|_{1, T}^2\Big)^{\frac{1}{2}} \\ &\cdot\Big(\sum\limits_{T\in {\mathcal{T}}_h}\sum\limits_{i = 1}^2 h_T^{-1}\|\zeta_{gi}-\partial_i \zeta_0\|_{\partial T}^2\Big)^{\frac{1}{2}} \\\leq &\; Ch^2\|w\|_{4}|||\zeta_h||| \\ \leq &\; Ch^2\|w\|_{4}(||| u-u_h|||+||| u-Q_hu|||) \\ \leq &\; Ch^{k+1}\|w\|_4\|u\|_{k+1}. \end{split} \end{equation} | (7.9) |
Substituting (7.5), (7.6), (7.8) and (7.9) into (7.4), and using (7.2), gives
\|\zeta_0\|^2\leq Ch^{k+1}\|w\|_4\|u\|_{k+1}\leq Ch^{k+1} \|u\|_{k+1} \|\zeta_0\|. |
This gives
\|\zeta_0\|\leq Ch^{k+1} \|u\|_{k+1}, |
which, using the triangle inequality and (6.2) with m = k and s = 0 , gives
\|e_0\|\leq \|\zeta_0\|+\|u-Q_0u\|\leq Ch^{k+1}\|u\|_{k+1}. |
This completes the proof of the theorem.
The author declares she has not used Artificial Intelligence (AI) tools in the creation of this article.
The research of Chunmei Wang was partially supported by National Science Foundation Grant DMS-2136380.
The author declares there is no conflict of interest.
[1] |
Y. Zhu, W. Zheng, Observer-based control for cyber-physical systems with dos attacks via a cyclic switching strategy, IEEE Transact. Autom. Control, 65 (2020), 3714–3721. https://doi.org/ 10.1109/TAC.2019.2953210 doi: 10.1109/TAC.2019.2953210
![]() |
[2] |
Z. Cai, Z. He, X. Guan, Y. Li, Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks, IEEE T. Depend. Secure., 15 (2018), 577–590. https://doi.org/10.1109/TDSC.2016.2613521 doi: 10.1109/TDSC.2016.2613521
![]() |
[3] |
Z. Guo, K. Yu, A. K. Bashir, D. Zhang, Y. D. Al-Otaibi, M. Guizani, Deep information fusion-driven POI scheduling for mobile social networks, IEEE Network, 36 (2022), 210–216. https://doi.org/10.1109/MNET.102.2100394 doi: 10.1109/MNET.102.2100394
![]() |
[4] |
Y. Li, H. Ma, L.Wang, S. Mao, G. Wang, Optimized content caching and user association for edge computing in densely deployed heterogeneous networks, IEEE T. Mobile Comput., 21 (2022), 2130–2142. https://doi.org/10.1109/TMC.2020.3033563 doi: 10.1109/TMC.2020.3033563
![]() |
[5] |
L. Chen, Y. Zhu, C. K. Ahn, Adaptive neural network-based observer design for switched systems with quantized measurements, IEEE T. Neur. Net. Lear., (2021). https://doi.org/10.1109/TNNLS.2021.3131412 doi: 10.1109/TNNLS.2021.3131412
![]() |
[6] |
Z. Guo, K. Yu, Z. Lv, K.-K. R. Choo, P. Shi, J. J. P. C. Rodrigues, Deep federated learning enhanced secure POI microservices for cyber-physical systems, IEEE Wirel. Commun., 29 (2022), 22–29. https://doi.org/10.1109/MWC.002.2100272 doi: 10.1109/MWC.002.2100272
![]() |
[7] |
L. Zhao, H. Chai, Y. Han, K. Yu, S. Mumtaz, A collaborative V2X data correction method for road safety, IEEE T. Reliab., 71 (2022), 951–962. https://doi.org/10.1109/TR.2022.3159664 doi: 10.1109/TR.2022.3159664
![]() |
[8] | L. Huang, R. Nan, K. Chi, Q. Hua, K. Yu, N. Kumar, et al., Throughput guarantees for multi-cell wireless powered communication networks with non-orthogonal multiple access, IEEE T. Veh. Technol., 71 (2022), 12104–12116. https://doi.org/10.1109/TVT.2022.3189699 |
[9] |
H. Moore, How to mathematically optimize drug regimens using optimal control, J. Pharmacokinet. Phar., 45 (2018), 127–137. https://doi.org/10.1007/s10928-018-9568-y doi: 10.1007/s10928-018-9568-y
![]() |
[10] |
Z. Guo, Y. Shen, S. Wan, W. Shang, K. Yu, Hybrid intelligence-driven medical image recognition for remote patient diagnosis in Internet of medical things, IEEE J. Biomed. Health., 26 (2022), 5817–5828, https://doi.org/10.1109/JBHI.2021.3139541 doi: 10.1109/JBHI.2021.3139541
![]() |
[11] |
S. Xia, Z. Yao, Y. Li, W. Shang, K. Yu, Online distributed offloading and computing resource management with energy harvesting for heterogeneous MEC-enabled IoT, IEEE T. Wirel. Commun., 20 (2021), 6743–6757. https://doi.org/10.1109/TWC.2021.3076201 doi: 10.1109/TWC.2021.3076201
![]() |
[12] |
Z. Guo, K. Yu, A. Jolfaei, F. Ding, N. Zhang, Fuz-Spam: Label smoothing-based fuzzy detection of spammers in Internet of Things, IEEE T. Fuzzy Syst., 30 (2022), 4543–4554. https://doi.org/10.1109/TFUZZ.2021.3130311 doi: 10.1109/TFUZZ.2021.3130311
![]() |
[13] |
X. Zheng, Z. Cai, Privacy-preserved data sharing towards multiple parties in industrial IoTs, IEEE J. Sel. Area. Comm., 38 (2020) 968–979. https://doi.org/10.1109/JSAC.2020.2980802 doi: 10.1109/JSAC.2020.2980802
![]() |
[14] |
T. Yang, Z. Bai, Z. Li, N. Feng, L. Chen, Intelligent vehicle lateral control method based on feedforward+ predictive LQR algorithm, Actuators, 10 (2021), 228. https://doi.org/10.3390/act10090228 doi: 10.3390/act10090228
![]() |
[15] |
C. Chen, Z. Liao, Y. Ju, C. He, K. Yu, S. Wan, Hierarchical domain-based multi-controller deployment strategy in SDN-enabled space-air-ground integrated network, IEEE T. Aero. Elec. Sys., 58 (2022), 4864–4879. https://doi.org/10.1109/TAES.2022.3199191 doi: 10.1109/TAES.2022.3199191
![]() |
[16] | A. Hudimova, I. Popových, O. Savchuk, V. Lіashko, A. Pyslar, A. Hrys, et al., Research on the relationship between excessive use of social media and young athletes' physical activity, J. Physical Educ. Sport, 21 (2021), 3364–3373. http://ekhsuir.kspu.edu/123456789/16375 |
[17] |
Y. Lin, X. Wang, F. Hao, Y. Jiang, Y.Wu, G. Min, et al., Dynamic control of fraud information spreading in mobile social networks, IEEE T. Syst. Man. Cy. A, 51 (2019), 3725–3738. https://doi.org/10.1109/TSMC.2019.2930908 doi: 10.1109/TSMC.2019.2930908
![]() |
[18] |
P. Singh, M. A. Dulebenets, J. Pasha, E. D. R. S. Gonzalez, Y.-Y. Lau, R. Kampmann, Deployment of autonomous trains in rail transportation: Current trends and existing challenges, IEEE Access, 9 (2021), 91427–91461. https://doi.org/10.1109/ACCESS.2021.3091550 doi: 10.1109/ACCESS.2021.3091550
![]() |
[19] |
R. S. Rajan, Y. Yu, F. Richert, Impact of cost-optimized dedicated hybrid transmission (DHT) constraints on powertrain optimal control, P. I. Mech. Eng. D: J. Aut., 236 (2022), 987–1006. https://doi.org/10.1177/09544070211029445 doi: 10.1177/09544070211029445
![]() |
[20] |
D. Fan, G. P. Jiang, Y. R. Song, Y.-W. Li, G. R. Chen, Novel epidemic models on PSO-based networks, J. Theor. Boil., 477 (2019), 36–43. https://doi.org/10.1016/j.jtbi.2019.06.006 doi: 10.1016/j.jtbi.2019.06.006
![]() |
[21] |
W. Wang, X. Chen, H. Fu, M. Wu, Data-driven adaptive dynamic programming for partially observable nonzero-sum games via Q-learning method, Int. J. Syst. Sci., 50 (2019), 1338–1352. https://doi.org/10.1080/00207721.2019.1599463 doi: 10.1080/00207721.2019.1599463
![]() |
[22] |
H. Habibzadeh, K. Dinesh, O. R. Shishvan, A. Boggio-Dandry, G. Sharma, T. Soyata, A survey of healthcare Internet of Things (HIoT): A clinical perspective, IEEE Int. Things J., 7 (2019), 53–71. https://doi.org/10.1109/JIOT.2019.2946359 doi: 10.1109/JIOT.2019.2946359
![]() |
[23] |
K. Mahmoud, M. Abdel-Nasser, M. Lehtonen, M. M. Hussein, Optimal voltage regulation scheme for pv-rich distribution systems interconnected with D-STATCOM, Elect. Pow. Compo. Sys., 48 (2021), 2130–2143. https://doi.org/10.1080/15325008.2021.1915430 doi: 10.1080/15325008.2021.1915430
![]() |
[24] |
M. F. Tabassum, S. Akram, S. Mahmood-ul-Hassan, R. Karim, P. A. Naik, M. Farman, et al., Differential gradient evolution plus algorithm for constraint optimization problems: A hybrid approach, Int. J. Optim. Control Theor. Appl. (IJOCTA), 11 (2021) 158–177. https://doi.org/10.11121/ijocta.01.2021.001077 doi: 10.11121/ijocta.01.2021.001077
![]() |
[25] |
C. Song, K. Kim, D. Sung, K. Kim, H. Yang, H. Lee, et al., A review of optimal energy management strategies using machine learning techniques for hybrid electric vehicles, Int. J. Auto. Tech., 22 (2021), 1437–1452. https://doi.org/10.1007/s12239-021-0125-0 doi: 10.1007/s12239-021-0125-0
![]() |
[26] | Z. D. Asher, A. A. Patil, V. T. Wifvat, A. A. Frank, S. Samuelsen, T, H. Bradley, Identification and review of the research gaps preventing a realization of optimal energy management strategies in vehicles, SAE Int. J. Altern. Pow., 8 (2019), 133–150. https://www.jstor.org/stable/26926444 |
[27] | Y. B. Zikria, R. Ali, M. K. Afzal, et al. Next-generation internet of things (iot): Opportunities, challenges, and solutions, Sensors, 21(2021) 1174. https://doi.org/10.3390/s21041174 |
[28] |
M. Strazzullo, F. Ballarin, G. Rozza, POD-Galerkin model order reduction for parametrized nonlinear time-dependent optimal flow control: an application to shallow water equations, J. Numer. Math., 30 (2022) 63–84. https://doi.org/10.1515/jnma-2020-0098 doi: 10.1515/jnma-2020-0098
![]() |
[29] |
P. Singh, Z. Elmi, V. K. Meriga, J. Pasha, M. A. Dulebenets, Internet of Things for sustainable railway transportation: Past, present, and future, Clean. Logist. Supply Chain, 4 (2022), 100065. https://doi.org/10.1016/j.clscn.2022.100065 doi: 10.1016/j.clscn.2022.100065
![]() |
[30] |
Y. Sarac, S. S. Sener, Identification of the initial temperature from the given temperature data at the left end of a rod, Appl. Math. Nonlinear Sci., 4 (2019), 469–474. https://doi.org/10.2478/AMNS.2019.2.00044 doi: 10.2478/AMNS.2019.2.00044
![]() |
[31] |
X. Shen, G. Shi, H. Ren, W. Zhang, Biomimetic vision for zoom object detection based on improved vertical grid number YOLO algorithm, Front. Bioeng. Biotech., 847 (2022), 905583. https://doi.org/10.3389/fbioe.2022.905583 doi: 10.3389/fbioe.2022.905583
![]() |
[32] |
P. Singh, Elmi Z, Lau Y, M. Borowska-Stefańska, S. Wiśniewski, M. A. Dulebenets, Blockchain and AI technology convergence: Applications in transportation systems, Veh. Commun., 38 (2022), 100521. https://doi.org/10.1016/j.vehcom.2022.100521 doi: 10.1016/j.vehcom.2022.100521
![]() |
[33] |
Y. Ünlü, Z. Taş, A bibliography experiment on research within the scope of industry 4.0 application areas in sports, J. New Result Sci., 17 (2020), 1149–1176. https://doi.org/10.14687/jhs.v17i4.6088 doi: 10.14687/jhs.v17i4.6088
![]() |